Commit 08d1b8d
committed
fix(security): tighten production CSP and validate CSRF allowedOrigins
- CSP: use 'self' for defaultSrc/scriptSrc instead of blanket 'https:'
to prevent XSS payload injection from arbitrary HTTPS domains
(aligned with OWASP and Helmet defaults)
- CSRF: validate allowedOrigins entries with new URL() and warn on
malformed entries instead of silently adding them
Signed-off-by: Pawel Kosiec <pawel.kosiec@databricks.com>1 parent 1a99c12 commit 08d1b8d
2 files changed
Lines changed: 14 additions & 7 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
39 | 39 | | |
40 | 40 | | |
41 | 41 | | |
42 | | - | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
43 | 50 | | |
44 | 51 | | |
45 | 52 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
34 | 34 | | |
35 | 35 | | |
36 | 36 | | |
37 | | - | |
38 | | - | |
39 | | - | |
40 | | - | |
41 | | - | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
42 | 42 | | |
43 | 43 | | |
44 | | - | |
| 44 | + | |
45 | 45 | | |
46 | 46 | | |
47 | 47 | | |
| |||
0 commit comments